{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T12:51:39Z","timestamp":1772542299920,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T00:00:00Z","timestamp":1560470400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T00:00:00Z","timestamp":1560470400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Pol\u00edcia Federal do Brasil","award":["08350.014739\/2016-14"],"award-info":[{"award-number":["08350.014739\/2016-14"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Scientometrics"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11192-019-03148-2","type":"journal-article","created":{"date-parts":[[2019,6,14]],"date-time":"2019-06-14T07:02:55Z","timestamp":1560495775000},"page":"539-565","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Technical research innovations of the US national security system"],"prefix":"10.1007","volume":"120","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6011-4016","authenticated-orcid":false,"given":"R. Fileto","family":"Maciel","sequence":"first","affiliation":[]},{"given":"P. Saskia","family":"Bayerl","sequence":"additional","affiliation":[]},{"given":"Marta Macedo","family":"Kerr Pinheiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,14]]},"reference":[{"issue":"1","key":"3148_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11192-012-0857-8","volume":"94","author":"M Acosta","year":"2013","unstructured":"Acosta, M., Coronado, D., Mar\u00edn, R., & Prats, P. (2013). Factors affecting the diffusion of patented military technology in the field of weapons and ammunition. Scientometrics, 94(1), 1\u201322. \n                              https:\/\/doi.org\/10.1007\/s11192-012-0857-8\n                              \n                           .","journal-title":"Scientometrics"},{"key":"3148_CR2","first-page":"24","volume":"77","author":"CP Atwood","year":"2015","unstructured":"Atwood, C. P. (2015). Activity-based intelligence revolutionizing military intelligence analysis. Joint Force Quarterly, 77, 24\u201333.","journal-title":"Joint Force Quarterly"},{"issue":"12","key":"3148_CR3","doi-asserted-by":"publisher","first-page":"2389","DOI":"10.1002\/asi.21419","volume":"61","author":"KW Boyack","year":"2010","unstructured":"Boyack, K. W., & Klavans, R. (2010). Co-citation analysis, bibliographic coupling, and direct citation: Which citation approach represents the research front most accurately? Journal of the American Society for Information Science and Technology, 61(12), 2389\u20132404. \n                              https:\/\/doi.org\/10.1002\/asi.21419\n                              \n                           .","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"3","key":"3148_CR4","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.joi.2014.04.001","volume":"88","author":"KW Boyack","year":"2014","unstructured":"Boyack, K. W., & Klavans, R. (2014). Including cited non-source items in a large-scale map of science: What difference does it make? Journal of Informetrics, 88(3), 569\u2013580. \n                              https:\/\/doi.org\/10.1016\/j.joi.2014.04.001\n                              \n                           . Elsevier Ltd.","journal-title":"Journal of Informetrics"},{"issue":"2","key":"3148_CR5","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/08850600390198715","volume":"16","author":"ES Cochran","year":"2003","unstructured":"Cochran, E. S. (2003). South Korea\u2019s intelligence targets U.S. technology. International Journal of Intelligence and CounterIntelligence, 16(2), 179\u2013201. \n                              https:\/\/doi.org\/10.1080\/08850600390198715\n                              \n                           .","journal-title":"International Journal of Intelligence and CounterIntelligence"},{"issue":"00","key":"3148_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/asi.23981","volume":"00","author":"G Colavizza","year":"2017","unstructured":"Colavizza, G., Boyack, K. W., van Eck, N. J., & Waltman, L. (2017). The closer the better: Similarity of publication pairs at different cocitation levels. Journal of the Association for Information Science and Technology, 00(00), 1\u201317. \n                              https:\/\/doi.org\/10.1002\/asi.23981\n                              \n                           .","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"10","key":"3148_CR7","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1002\/asi.21616","volume":"62","author":"B Cronin","year":"2011","unstructured":"Cronin, B. (2011). The intelligence disconnect. Journal of the American Society for Information Science and Technology, 62(10), 1867\u20131868. \n                              https:\/\/doi.org\/10.1002\/asi.21616\n                              \n                           .","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"3148_CR8","unstructured":"CWTS\u2014Centre for Science and Technology Studies\u2014Leiden University. (2018). Fields. \n                              http:\/\/www.leidenranking.com\/information\/fields\n                              \n                           ."},{"key":"3148_CR9","unstructured":"Daugherty Miles, A. (2016). Intelligence community spending: Trends and issues. Congressional Research Service. \n                              https:\/\/fas.org\/sgp\/crs\/intel\/R44381.pdf\n                              \n                           ."},{"issue":"1","key":"3148_CR10","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1002\/aris.1440360108","volume":"36","author":"PHJ Davies","year":"2005","unstructured":"Davies, P. H. J. (2005). Intelligence, information technology, and information warfare. Annual Review of Information Science and Technology, 36(1), 312\u2013352. \n                              https:\/\/doi.org\/10.1002\/aris.1440360108\n                              \n                           .","journal-title":"Annual Review of Information Science and Technology"},{"issue":"3","key":"3148_CR11","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/0048-7333(82)90016-6","volume":"11","author":"G Dosi","year":"1982","unstructured":"Dosi, G. (1982). Technological paradigms and technological trajectories: A suggested interpretation of the determinants and directions of technical change. Research Policy, 11(3), 147\u2013162. \n                              https:\/\/doi.org\/10.1016\/0048-7333(82)90016-6\n                              \n                           .","journal-title":"Research Policy"},{"issue":"4","key":"3148_CR12","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1002\/asi.23737","volume":"68","author":"N Grassano","year":"2017","unstructured":"Grassano, N., Rotolo, D., Hutton, J., Lang, F., & Hopkins, M. M. (2017). Funding data from publication acknowledgments: Coverage, uses, and limitations. Journal of the Association for Information Science and Technology, 68(4), 999\u20131017. \n                              https:\/\/doi.org\/10.1002\/jasist.23737\n                              \n                           .","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"3","key":"3148_CR13","doi-asserted-by":"publisher","first-page":"1721","DOI":"10.1007\/s11192-013-1126-1","volume":"98","author":"HM Hsuan","year":"2014","unstructured":"Hsuan, H. M., & Chang, C. P. (2014). Detecting research fronts in OLED field using bibliographic coupling with sliding window. Scientometrics, 98(3), 1721\u201344. \n                              https:\/\/doi.org\/10.1007\/s11192-013-1126-1\n                              \n                           .","journal-title":"Scientometrics"},{"issue":"7","key":"3148_CR14","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1002\/asi.22678","volume":"63","author":"M Kas","year":"2012","unstructured":"Kas, M., Khadka, A. G., Frankenstein, W., Abdulla, A. Y., Frank Kunkel, L., Carley, R., et al. (2012). Analyzing scientific networks for nuclear capabilities assessment. Journal of the American Society for Information Science and Technology, 63(7), 1294\u20131312. \n                              https:\/\/doi.org\/10.1002\/asi.22678\n                              \n                           .","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"3148_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1002\/asi.5090140103","volume":"14","author":"MM Kessler","year":"1963","unstructured":"Kessler, M. M. (1963). Bibliographic coupling between scientific papers. American Documentation, 14, 10\u201325. \n                              https:\/\/doi.org\/10.1002\/asi.5090140103\n                              \n                           .","journal-title":"American Documentation"},{"key":"3148_CR16","doi-asserted-by":"publisher","unstructured":"Kuhn, T. S. (1970). The structure of scientific revolutions. Vol. II. 2. \n                              https:\/\/doi.org\/10.1119\/1.1969660\n                              \n                           .","DOI":"10.1119\/1.1969660"},{"issue":"1","key":"3148_CR17","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1038\/srep00336","volume":"2","author":"A Lancichinetti","year":"2012","unstructured":"Lancichinetti, A., & Fortunato, S. (2012). Consensus clustering in complex networks. Scientific Reports, 2(1), 336. \n                              https:\/\/doi.org\/10.1038\/srep00336\n                              \n                           .","journal-title":"Scientific Reports"},{"issue":"5","key":"3148_CR18","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/s10961-008-9099-6","volume":"34","author":"D Libaers","year":"2009","unstructured":"Libaers, D. (2009). Industry relationships of DoD-funded academics and institutional changes in the US university system. Journal of Technology Transfer, 34(5), 474\u2013489. \n                              https:\/\/doi.org\/10.1007\/s10961-008-9099-6\n                              \n                           .","journal-title":"Journal of Technology Transfer"},{"issue":"1","key":"3148_CR19","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1080\/0268452042000222920","volume":"19","author":"K Macrakis","year":"2004","unstructured":"Macrakis, K. (2004). Does effective espionage lead to success in science and technology? Lessons from the East German ministry for state security. Intelligence and National Security, 19(1), 52\u201377. \n                              https:\/\/doi.org\/10.1080\/0268452042000222920\n                              \n                           .","journal-title":"Intelligence and National Security"},{"issue":"2","key":"3148_CR20","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0048-7333(01)00139-1","volume":"31","author":"F Malerba","year":"2002","unstructured":"Malerba, F. (2002). Sectoral systems of innovation and production. Research Policy, 31(2), 247\u201364. \n                              https:\/\/doi.org\/10.1016\/S0048-7333(01)00139-1\n                              \n                           .","journal-title":"Research Policy"},{"issue":"September","key":"3148_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.techfore.2017.09.020","volume":"1981","author":"TH Malik","year":"2017","unstructured":"Malik, T. H. (2017). Defence investment and the transformation national science and technology: A perspective on the exploitation of high technology. Technological Forecasting and Social Change, 1981(September), 1\u201310. \n                              https:\/\/doi.org\/10.1016\/j.techfore.2017.09.020\n                              \n                           . Elsevier.","journal-title":"Technological Forecasting and Social Change"},{"issue":"6","key":"3148_CR22","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1080\/08956308.2016.1232137","volume":"59","author":"J Matheny","year":"2016","unstructured":"Matheny, J. (2016). Forecasting innovation: Lessons from IARPA\u2019s research programs. Research-Technology Management, 59(6), 36\u201340. \n                              https:\/\/doi.org\/10.1080\/08956308.2016.1232137\n                              \n                           .","journal-title":"Research-Technology Management"},{"issue":"1","key":"3148_CR23","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11192-016-1842-4","volume":"107","author":"C Moreno","year":"2016","unstructured":"Moreno, C., del Carmen, M., Auzinger, T., & Werthner, H. (2016). On the uncertainty of interdisciplinarity measurements due to incomplete bibliographic data. Scientometrics, 107(1), 213\u201332. \n                              https:\/\/doi.org\/10.1007\/s11192-016-1842-4\n                              \n                           .","journal-title":"Scientometrics"},{"issue":"5","key":"3148_CR24","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1002\/asi.10227","volume":"54","author":"SA Morris","year":"2003","unstructured":"Morris, S. A., Yen, G., Zheng, W., & Asnake, B. (2003). Time line visualization of research fronts. Journal of the American Society for Information Science and Technology, 54(5), 413\u2013422. \n                              https:\/\/doi.org\/10.1002\/asi.10227\n                              \n                           .","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"10","key":"3148_CR25","doi-asserted-by":"publisher","first-page":"1703","DOI":"10.1016\/j.respol.2012.03.027","volume":"41","author":"DC Mowery","year":"2012","unstructured":"Mowery, D. C. (2012). Defense-related R&D as a model for \u201cgrand Challenges\u201d technology policies. Research Policy, 41(10), 1703\u20131715. \n                              https:\/\/doi.org\/10.1016\/j.respol.2012.03.027\n                              \n                           . Elsevier B.V.","journal-title":"Research Policy"},{"key":"3148_CR26","unstructured":"National Intelligence Council. (2012). Global trends 2030: Alternative worlds. \n                              https:\/\/doi.org\/ISBN 978-1-929667-21-5\n                              \n                           ."},{"key":"3148_CR27","volume-title":"Main science and technology indicators","author":"OECD","year":"2018","unstructured":"OECD. (2018). Main science and technology indicators. Paris: OECD."},{"key":"3148_CR28","unstructured":"Office of the Director of National Intelligence, and United States Intelligence community. (2014). FY2015-2019 IC S&T INVESTMENT LANDSCAPE: ensuring future capabilities align to mission needs. \n                              https:\/\/www.dni.gov\/files\/documents\/atf\/FY2015-2019IC_S&T_Investment_Landscape.pdf\n                              \n                           ."},{"issue":"1","key":"3148_CR29","doi-asserted-by":"publisher","first-page":"e0190646","DOI":"10.1371\/journal.pone.0190646","volume":"13","author":"NV Olijnyk","year":"2018","unstructured":"Olijnyk, N. V. (2018). Examination of China\u2019s performance and thematic evolution in quantum cryptography research using quantitative and computational techniques. Edited by Judit Bar-Ilan. PLoS ONE, 13(1), e0190646. \n                              https:\/\/doi.org\/10.1371\/journal.pone.0190646\n                              \n                           .","journal-title":"PLoS ONE"},{"issue":"2","key":"3148_CR30","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1002\/sej.1199","volume":"9","author":"LA Plummer","year":"2015","unstructured":"Plummer, L. A., & Gilbert, B. A. (2015). The effect of defense agency funding of university research on regional new venture creation. Strategic Entrepreneurship Journal, 9(2), 136\u2013152. \n                              https:\/\/doi.org\/10.1002\/sej.1199\n                              \n                           .","journal-title":"Strategic Entrepreneurship Journal"},{"issue":"3","key":"3148_CR31","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s11192-008-2197-2","volume":"81","author":"AL Porter","year":"2009","unstructured":"Porter, A. L., & Rafols, I. (2009). Is science becoming more interdisciplinary? Measuring and mapping six research fields over time. Scientometrics, 81(3), 719\u2013745. \n                              https:\/\/doi.org\/10.1007\/s11192-008-2197-2\n                              \n                           .","journal-title":"Scientometrics"},{"key":"3148_CR32","doi-asserted-by":"publisher","unstructured":"Ruttan, V. W. (2006). Is war necessary for economic growth? Military procurement and technology development. December 2017. \n                              https:\/\/doi.org\/10.1093\/0195188047.001.0001\n                              \n                           .","DOI":"10.1093\/0195188047.001.0001"},{"key":"3148_CR33","unstructured":"The United States Intelligence Community. (2018). Member Agencies. \n                              https:\/\/www.intelligence.gov\/how-the-ic-works\n                              \n                           ."},{"key":"3148_CR34","doi-asserted-by":"publisher","DOI":"10.3386\/w9725","volume-title":"Crafting defense R&D policy in the anti-terrorist era","author":"M Trajtenberg","year":"2003","unstructured":"Trajtenberg, M. (2003). Crafting defense R&D policy in the anti-terrorist era. Cambridge, MA: National Bureau of Economic Research. \n                              https:\/\/doi.org\/10.3386\/w9725\n                              \n                           ."},{"key":"3148_CR35","unstructured":"United States President. (2017). Organization of the national security council, the homeland security council, and subcommittees. \n                              https:\/\/www.law.cornell.edu\/uscode\/text\/50\/3021\n                              \n                           ."},{"issue":"1","key":"3148_CR36","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11192-009-0051-9","volume":"83","author":"SP Upham","year":"2010","unstructured":"Upham, S. P., & Small, H. (2010). Emerging research fronts in science and technology: Patterns of new knowledge development. Scientometrics, 83(1), 15\u201338. \n                              https:\/\/doi.org\/10.1007\/s11192-009-0051-9\n                              \n                           .","journal-title":"Scientometrics"},{"issue":"2","key":"3148_CR37","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s11192-017-2300-7","volume":"111","author":"NJ van Eck","year":"2017","unstructured":"van Eck, N. J., & Waltman, L. (2017). Citation-based clustering of publications using CitNetExplorer and VOSviewer. Scientometrics, 111(2), 1053\u201370. \n                              https:\/\/doi.org\/10.1007\/s11192-017-2300-7\n                              \n                           . Springer Netherlands.","journal-title":"Scientometrics"},{"issue":"5","key":"3148_CR38","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1080\/02684527.2014.887633","volume":"30","author":"KM Vogel","year":"2015","unstructured":"Vogel, K. M., & Knight, C. (2015). Analytic outreach for intelligence: Insights from a workshop on emerging biotechnology threats. Intelligence and National Security, 30(5), 686\u2013703. \n                              https:\/\/doi.org\/10.1080\/02684527.2014.887633\n                              \n                           .","journal-title":"Intelligence and National Security"},{"issue":"7674","key":"3148_CR39","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1038\/550032a","volume":"550","author":"CS Wagner","year":"2017","unstructured":"Wagner, C. S., & Jonkers, K. (2017). Open countries have strong science. Nature, 550(7674), 32\u201333. \n                              https:\/\/doi.org\/10.1038\/550032a\n                              \n                           .","journal-title":"Nature"},{"issue":"12","key":"3148_CR40","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1002\/asi.22748","volume":"63","author":"L Waltman","year":"2012","unstructured":"Waltman, L., & Van Eck, N. J. (2012). A new methodology for constructing a publication-level classification system of science. Journal of the American Society for Information Science and Technology, 63(12), 2378\u201392. \n                              https:\/\/doi.org\/10.1002\/asi.22748\n                              \n                           .","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"11","key":"3148_CR41","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1140\/epjb\/e2013-40829-0","volume":"86","author":"L Waltman","year":"2013","unstructured":"Waltman, L., Eck, V., & Jan, N. (2013). A smart local moving algorithm for large-scale modularity-based community detection. European Physical Journal B, 86(11), 471.","journal-title":"European Physical Journal B"},{"issue":"1","key":"3148_CR42","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1080\/02684527.2012.621604","volume":"27","author":"M Warner","year":"2012","unstructured":"Warner, M. (2012). Reflections on technology and intelligence systems. Intelligence and National Security, 27(1), 133\u2013153. \n                              https:\/\/doi.org\/10.1080\/02684527.2012.621604\n                              \n                           .","journal-title":"Intelligence and National Security"}],"container-title":["Scientometrics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-019-03148-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11192-019-03148-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11192-019-03148-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T23:27:27Z","timestamp":1592004447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11192-019-03148-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,14]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["3148"],"URL":"https:\/\/doi.org\/10.1007\/s11192-019-03148-2","relation":{},"ISSN":["0138-9130","1588-2861"],"issn-type":[{"value":"0138-9130","type":"print"},{"value":"1588-2861","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,14]]},"assertion":[{"value":"24 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2019","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}